Abstract
This article deals with information security in information systems projects, which has become vital in a context of cybercrimes and economic spying proliferation. Based on the theoretical research model derived from UTAUT 2 and TAM models, this study seeks to determine the factors that influence the intention to adopt and use information security in Information Systems (IS) projects. Both qualitative and quantitative approaches were employed. Upon data analysis on the SmartPLS 3.2.7 software, the results suggested that: (i) perceived usefulness, habit, and facilitating conditions have a positive influence on the intention to use information security in IS projects; (ii) habit has a positive influence on the use of information security in IS projects. This study surely contributes to enriching the literature in the field of information security where the level of scientific research production remains low.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Information Systems
- 2.
Federal Bureau of Investigation
- 3.
Non-Governmental Organizations
- 4.
Partial Least Square
- 5.
Average Variance Extracted
References
Kotulic, A.G., Clark, J.G.: Why there aren’t more information security research studies. Inf. Manag. 41(5), 597–607 (2004)
Dagorn, N., Poussing, N.: Engagement et pratiques des organisations en matière de gouvernance de la sécurité de l’information. Systèmes d’information Manag. 17(1), 113–143 (2012)
Raufer, X.: De la cyber-jungle au cybermonde. Sécurité Globale 8(4), 5–10 (2016)
Le Cœur, J.: Sécuriser les données personnelles de son entreprise. I2D Inf. données Doc. 53(1), 25–26 (2016)
Wolf, P.: Les menaces numériques aujourd’hui. Sécurité et stratégie 3(1), 44–46 (2010)
Christian, M., Dennis, K., Jochen, W.: Is it worth the effort? A decision model to evaluate resource interactions in IS project portfolios. Paderborn University, Faculty of Business Administration and Economics (2015)
Aïm, R.: Les fondamentaux de la gestion de projet. http://groupe.afnor.org/pdf/fondamentaux-gestion-projet.pdf. Accessed 27 May 2017
Coupe, C., Masanovic, S., Rodet, P.: L’humain au secours d’un management violent: le mode projet. http://www.finyear.com/L-humain-au-secours-d-un-management-violent-le-mode-projet_a11046.html. Accessed 28 June 2017
Chen, A.: Gérer les données personnelles fournies aux applications. I2D Inf. données Doc. 54(3), 47–48 (2017)
Coopers, P.W.: La cybersécurité en France vue par les entreprises: 47% de cyberattaques en moins et des pertes financières divisées par deux en (2016). http://www.pwc.fr/fr/espace-presse/communiques-de-presse/2016/octobre/cybersecurite-france-gsiss.html. Accessed 29 March 2017
Yuan, T., Chen, P.: Data mining applications in E-government information security. Procedia Eng. 29, 235–240 (2012)
Dajoux, J.: La perte de données, une cause importante de faillite des entreprises. https://www.informanews.net/perte-de-donnees-cause-faillite/. Accessed 31 Oct 2018
Venkatesh, V., et al.: Extending the two-stage information systems continuance model: Incorporating UTAUT predictors and the role of context. Inf. Syst. J. 21(6), 527–555 (2011)
Venkatesh, V., Thong, J.Y.L., Xu, X.: Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. Manag. Inf. Syst. Q. 36(1), 157–178 (2012)
Venkatesh, V., Brown, S.A., Bala, H.: Bridging the qualitative-quantitative divide: Guidelines for conducting mixed methods research in information systems. MIS Q. 37(1), 21–54 (2013)
Gefen, D., Straub, D.: A practical guide to factorial validity using PLS-graph: tutorial and annotated example. Commun. Assoc. Inf. Syst. 16(1), 5 (2005)
Kunstelj, M., Jukić, T., Vintar, M.: Comment tirer pleinement parti des résultats des enquêtes auprès des utilisateurs du gouvernement électronique: le cas de la Slovénie. Revue Internationale des Sci. Adm. 75(1), 129–166 (2009)
Hair Jr., J.F., et al.: A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). Sage Publications, Thousand Oaks (2016)
Venkatesh, V., Bala, H.: Technology acceptance model 3 and a research agenda on interventions. Dec. Sci. 39(2), 273–315 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Tafokeng Talla, L., Kala Kamdjoug, J.R. (2019). Factors Influencing Adoption of Information Security in Information Systems Projects. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 931. Springer, Cham. https://doi.org/10.1007/978-3-030-16184-2_84
Download citation
DOI: https://doi.org/10.1007/978-3-030-16184-2_84
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16183-5
Online ISBN: 978-3-030-16184-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)